Generator of consistent Wireguard configurations
Project description
wg-confgen
wg-confgen is generator of consistent Wireguard configurations.
wg-confgen stores data about all clients in a JSON file (by default: wg0.json in
current directory) and generates consistent Wireguard configs per client. You
can edit this JSON by hand or use built-in wg-confgen modify subcommand. It
contains sensitive information (clients' private keys) so it should be stored
securely, similar to ordinary Wireguard configuration files.
Installation
There are several ways to install wg-confgen:
- just copy
src/wg_confgen/wg_confgen.pyanywhere in your$PATH, for example:cp src/wg_confgen/wg_confgen.py /usr/local/bin/wg-confgen pipx install .uv tool install .
Usage
wg-confgen show
Generate Wireguard configuration for a given client.
$ wg-confgen show client
A nifty trick is generating QR codes from the generated configuration, which can be easily transferred to mobile Wireguard clients (just remember to decrease the font size of your terminal, because QR codes for Wireguard configs can be quite big).
$ wg-confgen show client | qrencode -t ANSI
[!NOTE]
Remember that mobile Wireguard clients don't support all parameters which can be set in
[Interface]or[Peer]sections so make sure they're not set when generating qrencode, or grep them away:wr-confgen show client | grep -v PostUp | qrencode -t ANSIYou can also use wr-confgen itself for this task:
wr-confgen < wg0.json -c - modify client PostUp unset | wr-confgen -c - show client | qrencode -t ANSI
wg-confgen modify
To add clients or modify their settings, use wg-confgen modify <param1> <value1> <param2> <value2> .... This subcommand allows changing and removing
many parameters at once, or adding or removing values from parameters which
allow more than one value (for example, adding more AllowedIPs or Peers).
Syntax:
wg-confgen modify [options] <client> [changes...]
changes := <parameter> [modification_type] <value...>
modification_type := "set" | "add" | "remove"
Modification types:
set: set parameter to a given value (default when missing)add: add a value to the list of parameters (e.g. IP address to AllowedIPs)remove: remove a value from the list of parameters, or unset the parameter
Instead of literal value, special values can be used:
unset: unsets the value for the client, including the inherited default (as provided by "defaults" section in input JSON); in JSON this state is represented as explicitnullassigned to the parameterdefault: brings back parameter value to the default (as provided by "defaults" section in input JSON); in JSON this state is represented as a missing key for a parametergenerate: automatically generate a key. This is useful as a default for PresharedKey, which will enable automatic generation of PresharedKey for all configured clients. When used on clients, it will force one time regeneration of private or preshared keys.
[!NOTE]
Keys (PrivateKey, PresharedKey) are not inherited from "defaults" section.
modify subcommand can be used to change defaults for all of the clients:
wg-confgen modify defaults ....
[!TIP]
A side-effect of running
wg-confgen modifyis that all missing private keys will be regenerated. This is true even for "no-op" modify without any changes, likewg-confgen modify defaults
Examples:
$ wg-confgen modify client_name \
PrivateKey set `wg genpk` \
PersistentKeepalive 30 \
AllowedIPs add 192.168.1.0/24 10.0.0.{id}/32 \
DNS remove 8.8.8.8
$ wg-confgen modify defaults PresharedKey generate
$ wg-confgen modify client-with-key-rotation \
PrivateKey generate
PresharedKey generate
Overrides (Peer-Specific Settings)
Sometimes we may need to override specific parameters for some clients when they
are used as peers of the other clients. This is achieved with --peer option.
For example, we might configure a "server" client with AllowedIPs in range 192.168.1.1/24 for all clients, except a "router" client, to which this is a native subnet and it shouldn't route this traffic via VPN.
$ wg-confgen modify server AllowedIPs 192.168.1.1/24 10.8.0.1/24
$ wg-confgen modify router --peer server AllowedIPs 10.8.0.1/24
Peer overrides apply to the currently set overrides, not actual peer settings. In above example, using '--peer server AllowedIPs remove 192.168.1.1/24' would result with empty overrides, because AllowedIPs override was initially empty.
--peer options may be used many times, but it's best to use them at the end of
command invocation, because they share syntax with ordinary changes and as such
will consume all remaining parameters.
wg-confgen peers
To quickly add or remove a client as a peer to many other clients, use peers
subcommand.
Add server as a peer to all clients (but not vice-versa):
$ wg-confgen peers server addto '*'
Add server as a peer to only selected clients:
$ wg-confgen peers server addto client1 client2 'client_pattern*'
Remove server from all clients peers:
$ wg-confgen peers server removefrom '*'
wg-confgen remove
Remove clients. This will also remove them from Peers of remaining clients and from peer overrides.
$ wg-confgen remove client1 client2
wg-confgen variable
To set variables, which can be then interpolated as {var.<varname>}, use wg confgen variable. This subcommand accepts a list of pairs <variable> <value>
and then will set a variable to desired value, or remove it if <value> has a
special value unset. For example:
$ wg-confgen variable net 10.8.0 mask 24
$ wg confgen modify defaults Address "{var.net}.{id}/{var.mask}"
Using as a Filter
You can use wr-confgen as a filter by passing - as the path to the
configuration. In this mode, wr-confgen will read configuration JSON from the
standard input and print its results to the standard output.
wr-confgen < wg0.json -c - modify client PostUp unset |
wr-confgen -c - show client |
qrencode -t ANSI
Parameters Handling
There are few special cases about how wg-confgen handles some Wireguard
parameters:
PrivateKeyandPublicKeymust be always kept synchronised, sowg-confgenwill disregard any manually set public keys and instead will regenerate them as necessary- Keys do not have default values, so they will ignore
defaultdirectives Endpointwill useListenPortof client, unless a different port is explicitly specified forEndpoint
JSON
You can see example of JSON database in wg0.json in this repository.
JSON files used by wg-confgen are quite simple. They're root object is a dictionary with following fields:
clients: an ordered mapping of clients. Order of clients is important, because it decides about the value of{id}interpolation variable. Each field of client maps directly to the names of Wireguard parameters. Parameter names in JSON are case sensitive.PublicKeyis omitted because wg-confgen always regenerates it.- under
clients, there's a specialoverridesmapping, which contains parameter overrides in[Peer]sections when client is used as the interface.
- under
defaults: a dummy "client" object which provides default values for all the other clients in theclientssection.variables: mapping which provides a space for arbitrary user-provided variables which can be used in clients' parameters.
Meaning of the Parameters
- when parameter is missing in the client, the default value from
defaultswill be used - when parameter is set to
null, it means that this particular parameter for the client should not be set, even if default is used - when a key is set to
"__GENERATE__"string, wg-confgen will generate the associated key - variable interpolations are enclosed in curly braces
{id}: number of client, starting from 1{name}: name of client, obtained from the key in the mapping inclientssection{var.<name>}: variable fromvariablessection (strings only)
{
"clients": {
"server": {
"PrivateKey": "2Nf4mHbWfJl9YDwSrf6WvwRQTMpd2uIO5qrwqxbtf0Y=",
"Peers": ["client1", "client2"]
},
"client1": {
"PrivateKey": "gMRn6H/TAfS2A6Ltk8ZEvjbZeuQXK6iHOVPtAR4qbF0=",
"PersistentKeepalive": null,
},
"client2": {
"PrivateKey": "wI8muH8Tv7Mm6S+B9ceqMkAxfKPC9eAesiobmMKt0Xk=",
"AllowedIPs": ["{var.net}.{id}/32", "192.168.1.0/24"],
}
},
"defaults": {
"Address": "{var.net}.{id}/24",
"PersistentKeepalive": 25,
"Peers": ["server"]
},
"variables": {
"net": "10.8.0"
}
}
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file wg_confgen-0.3.0.tar.gz.
File metadata
- Download URL: wg_confgen-0.3.0.tar.gz
- Upload date:
- Size: 18.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.6.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d512602c49268712566df39ed7698cb7b449488b0ee2f02c28c65d6338542d8b
|
|
| MD5 |
7a06cff7b3bbf7e820434c4ae03c2605
|
|
| BLAKE2b-256 |
7e912880c52014511004a4d063b5887dfc3edaef88a349a93d0e14fee3d29653
|
File details
Details for the file wg_confgen-0.3.0-py3-none-any.whl.
File metadata
- Download URL: wg_confgen-0.3.0-py3-none-any.whl
- Upload date:
- Size: 13.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.6.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
9071846c7052ef67d8757a5580201962306966dba41b836dff4f04f9b21df967
|
|
| MD5 |
6ac36b2522f9a5367e54fd4ea5749ba4
|
|
| BLAKE2b-256 |
edceedacd9bbbda342b4d396b339e7eae821dfe74a135dd66957927e7e5cb2d0
|